Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be integrated with the texts encrypted to ensure system safety and to prevent the violation of data owners ' privacy. For this purpose, before sending the data to the cloud, it must be encrypted in such a way that operations such as max, min, etc. can be performed on it. The proposed method uses order-preserving symmetric encryption (OPES), which does not require decryption or re-encryption for mathematical operations. This process leads to a great improvement in delay. The OPES scheme allows comparison operations to be performed directly on encrypted data without decryption operands. According to the results, it is obvious that the proposed strategy is in a better position compared to the base paper in terms of the system's ability to find the malicious elements that cause the problem of leakage and in terms of system security to prevent the violation of privacy.
English is spoken by its native speakers in two different forms. Reduced form which marks the colloquial and rapid speech so that it is easily produced and a citation or unreduced form which is a characteristic of careful, emphasized and slow speech.
This paper investigates Iraqi EFL university students’ production of the two forms mentioned above. The sample chosen includes twenty fourth year students, of which ten are males and the other ten are females from the Department of English of the College of Languages of the University of Duhok in Kurdistan Region of Iraq in the academic year 2020-2021. The material tested is six connective words which represent the commonest ones in every-day co
... Show MoreChildren who have a health problem need special requirements for their clothes. The purpose of the study is to design functional and aesthetic clothes to meet their needs. The research used the applied descriptive approach. The research sample comprised 120 women whose children suffered from hip dislocation. Designs for injured children presented and submitted to the arbitrators for evaluation regarding the functional and aesthetic aspects. The finding was achieving the design solutions. The most important recommendations are to increase attention to designing clothes to suit all the needs of society.
The Plerion nebula is characterized by its pulsar that fills the center of the supernova remnant with radio and X-ray frequencies. In our galaxy there are nine naked plerionic systems known, of which the Crab Nebula is the best-known example. It has been studied this instance in order to investigate how the pulsar energy affect on the distribution and evolution of the remnant as well as study the pulsar kick velocity and its influence on the remnant. From the obtained results it's found that, the pulsar of the Crab Nebula injects about (2−3)𝑥 1047 erg of energy to the remnant, although this energy is small compared to the supernova explosion energy which is about 1051 erg but still plays a significant role in the distribution and the m
... Show MoreIn the present study, multi-walled carbon nanotubes (MWCNTs) with outside diameters of< 8 nm and 20−30 nm were covalently functionalized with β-Alanine using a novel synthesis procedure. The functionalization process was proved successful using Raman spectroscopy, FTIR, and TEM. Utilizing the two-step method with ultrasonication, the MWCNTs treated with β-Alanine (Ala-MWCNTs) with weight concentrations of 0.025%, 0.05%, 0.075%, and 0.1% were dispersed in distilled water to prepare water-based nanofluids. The aqueous colloidal dispersions of pristine MWCNTs were unstable. While for Ala-MWCNTs and after> 50 days from preparation, higher colloidal stability was obtained up to relative concentration of 0.955 and 0.939 for the 0.075-wt% samp
... Show MoreThere is currently a pressing need to create an electro-analytical approach capable of detecting and monitoring genosensors in a highly sensitive, specific, and selective way. In this work, Functionalized Multiwall Carbon Nanotubes, Graphene, Polypyrrole, and gold nanoparticles nanocomposite (f-MWCNTs-GR-PPy-AuNP) were effectively deposited on the surface of the ITO electrode using a drop-casting process to modify it. The structural, morphological, and optical analysis of the modified ITO electrodes was carried out at room temperature using X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) images, atomic force microscopy (AFM) and Fourier transform infrared (FTIR) spectra. Cyclic voltammetry (CV) and electrochemi
... Show MoreA series of lanthanide metal (???) complexes have been prepared from the new azo ligand, 3-(1-methyl-2-benzimidazolylazo)-Tyrosine (MBT). The structural feature were confirmed on the basis of their elemental analysis, metal content, molar conductance, magnetic measurement, FTIR, 1 HNMR and UV-Vis spectra studies. The isolated complexes were found to have a mole ratio (1:2) (metal:ligand) stoichiometry with the general formula [Ln(MBT)2]Cl (Ln(???) = La, Ce, Pr, Nd, Sm, Eu and Gd). The chelates were found to have octahedral structures. The FTIR spectra shows that the ligand (MBT) is coordinated to lanthanide ions as a N, N, O-tridentate anion via benzimidazole nitrogen, azo nitrogen and oxygen of hydroxyl after deprotonation. Com
... Show More